Learn about the NAVSO P-5239-26 method

NAVSO P-5239-26 is a software-based Data Sanitization method used in various file shredder and data shredder programs to overwrite existing information on a hard drive or other storage device.

Erasing your hard drive with the NAVSO P-5239-26 method will prevent all software-based file recovery methods from getting the information from the drive, and also prevent most hardware-based recovery methods. extract information.

How does NAVSO P-5239-26 method work?

Methods to delete data NAVSO P-5239-26 are usually carried out in the following way:

  1. 1st time - Override a character (e.g. 1)
  2. 2nd - Override another character (e.g. 0)
  3. 3rd - Overwrite a random character and verify the record

The NAVSO P-5239-26 method that the article listed above is the standard way that most data destruction programs perform. However, according to actual specification, this is a less effective alternative.

Preferred method involves a more complex type of override.

Learn about the NAVSO P-5239-26 method Picture 1 Erasing the hard drive with the NAVSO P-5239-26 method will prevent all software-based file recovery methods from retrieving the information from the drive.

Origin of NAVSO P-5239-26

The NAVSO P-5239-26 method was originally defined in Navy Staff Office Publication 5239 Module 26: Information Systems Security Program Guidelines , published by the US Navy.

You can read the Data Sanitization specification of NAVSO P-5239-26 in sections 3.3.c.1 and 3.3.c.2 of NAVSO 5239-26 by following the link:

https://fas.org/irp/doddir/navy/5239_26.htm

It is unclear whether the US Navy is still using NAVSO P-5239-26 as a software-based data deletion standard.

In fact, most data destruction programs support a variety of data deletion methods besides NAVSO P-5239-26.

3.8 ★ | 4 Vote

May be interested

  • The fake IP method helps you access anonymouslyThe fake IP method helps you access anonymously
    in many previous articles, we have mentioned that it is very important to remain anonymous online. the private information leaked every year makes online security problems increasingly necessary. that is why we should use a virtual ip address. below, we will learn the methods to create fake ip offline!
  • What is the Random Data method?What is the Random Data method?
    the random data method is a software-based data sanitization method, used in some file shredder and data shredder programs to overwrite existing information on hard drives or other storage devices.
  • Learn about the Adversary-in-the-Middle phishing attack methodLearn about the Adversary-in-the-Middle phishing attack method
    phishing attacks are extremely common right now. this method of cybercriminals can be very effective in stealing data and does not require a large amount of work at the grassroots level.
  • Learn about the CSEC ITSG-06 methodLearn about the CSEC ITSG-06 method
    csec itsg-06 is a software-based data sanitization method, used in some file shredder and data shredder programs, to overwrite existing information on hard drives or other storage devices.
  • Pomodoro 'tomato' method: Working focused, highly effective without fatiguePomodoro 'tomato' method: Working focused, highly effective without fatigue
    how can you work continuously for 4 - 5 hours (or more) and still be effective, do not feel tired and do not exhaust the idea? pomodoro - also known as tomato fruit is the method to increase the performance you need.
  • Shadowing Technique: Practice speaking English effectively without having to go to the centerShadowing Technique: Practice speaking English effectively without having to go to the center
    with the shadowing method, you can practice speaking english anytime, anywhere, effectively and super savings.
  • How trojan pretends to be a PDF file using the RLO . methodHow trojan pretends to be a PDF file using the RLO . method
    you cannot guarantee that a file is really an image, video, pdf or text file just by looking at the file extension. on windows, an attacker can execute a pdf file as if it were an exe file.
  • How to Add Numbers Automatically in ExcelHow to Add Numbers Automatically in Excel
    there are two different ways to add numbers to a column automatically. the surest way to add automatic number ranges to excel is to use the row function. this method will ensure that cells display the correct numbering even when rows are added or deleted. the second way (without typing the formula) is to use the fill feature, this method is easier but when you delete the line the number range will be missing. let's learn how to automatically number rows, or enter consecutive numbers in columns.
  • Limit records in MongoDBLimit records in MongoDB
    to limit the records in mongodb, you need to use the limit () method. the limit () method takes a parameter in a numeric format, which is the document number you want to display.
  • 7 simple tips to help you learn new languages ​​in just one week7 simple tips to help you learn new languages ​​in just one week
    extremely useful foreign language learning tips for two 10-speaking twins.